Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Differential privacy in edge computing-based smart city applications: Security issues, solutions and future directions
Fast-growing smart city applications, such as smart delivery, smart community, and smart
health, are generating big data that are widely distributed on the internet. IoT (Internet of …
health, are generating big data that are widely distributed on the internet. IoT (Internet of …
Fog Computing for Spatial Data Infrastructure: Challenges and Opportunities
Fog computing is a promising approach to address the challenges faced by traditional
spatial data infrastructure when processing large-scale and real-time data. This chapter …
spatial data infrastructure when processing large-scale and real-time data. This chapter …
[PDF][PDF] Tackling security and privacy challenges in the realm of big data analytics
J Ngesa - World Journal of Advanced Research and Reviews, 2024 - researchgate.net
As organizations increasingly harness the power of big data analytics to derive insights and
drive decision-making, the paramount concerns of security and privacy have come to the …
drive decision-making, the paramount concerns of security and privacy have come to the …
Surveying federated learning approaches through a multi-criteria categorization
In recent years, more and more attention has been paid to the privacy issues associated with
storing user data in a centralized manner. In fact, strict laws have been introduced to …
storing user data in a centralized manner. In fact, strict laws have been introduced to …
Secure personal authentication in fog devices via multimodal rank‐level fusion
In recent years, Fog and edge computing have gained enormous increases and usage of
Internet of Things (IoT) devices in research and development even though it provides …
Internet of Things (IoT) devices in research and development even though it provides …
[PDF][PDF] On the privacy afforded by opaque identifiers in traffic monitoring (extended version)
M Gelderie - 2024 - hs-aalen.de
We consider traffic monitoring via license plate recognition. Anonymizing license plates by
substituting randomized identifiers is a common privacy enhancing strategy in this situation …
substituting randomized identifiers is a common privacy enhancing strategy in this situation …
[PDF][PDF] Differential Privacy for Distributed Traffic Monitoring in Smart Cities.
M Gelderie, M Luff, L Brodschelm - ICISSP, 2024 - scitepress.org
We study differential privacy in the context of gathering real-time congestion of entire routes
in smart cities. Gathering this data is a distributed task that poses unique algorithmic and …
in smart cities. Gathering this data is a distributed task that poses unique algorithmic and …
Cloud Service Authentication Using Attribute-Based Pseudonymity For Ensure Privacy
In order to protect privacy, this paper proposes utilizing attribute-based pseudonymity for
cloud service authentication. To enable attribute verification, the proposed phenomenal …
cloud service authentication. To enable attribute verification, the proposed phenomenal …
Certain investigations in data migration and security by sequence cover cat and cover particle swarm optimization in fog computing
The large amount of data produced in Internet of Things (IoT) environments has recently
caused a rapid development in fog and mobile edge computing. It suffers in the areas of …
caused a rapid development in fog and mobile edge computing. It suffers in the areas of …
[PDF][PDF] Differential Privacy for Distributed Traffic Monitoring in Smart Cities (Full Version)
M Gelderie, M Luff, L Brodschelm - hs-aalen.de
We study differential privacy in the context of gathering real-time congestion of entire routes
in smart cities. Gathering this data is a distributed task that poses unique algorithmic and …
in smart cities. Gathering this data is a distributed task that poses unique algorithmic and …